Spelling suggestions: "subject:"espionage"" "subject:"spionage""
11 |
Covert action : a useful tool for United States foreign policy?Uram, Derek Andrew. 10 April 2008 (has links)
No description available.
|
12 |
George Washington, America's first director of military intelligence / Identification and resolution of problems with methodology used in selection of technological concepts for research and development supportPrather, Michael S. 06 1900 (has links)
Thesis: George Washington, as Commander-in-Chief of the Continental Army led this nation to victory and independence in the American War for Independence. Victory was facilitated by his direct and effective use of intelligence sources and methods. Discussion: During the American War for Independence, intelligence information regarding location, movement, and disposition of British forces allowed the Continental Army to fight on its own terms and stymie British efforts to quell the revolution. General George Washington, as Commanding General of the Continental Army, was aware of the value of intelligence in the proper conduct of military operations. Washington literally became America's first director of military intelligence. He directed the intelligence operations that were conducted, and performed his own analysis. The Continental Army's effectiveness in intelligence includes examples of the proper use of espionage, counterintelligence, communications security, codebreaking, deception, operational security, surveillance, reconnaissance, reporting and analysis. Time after time, the Americans were properly prepared with good intelligence ultimately resulting in independence from the British. These intelligence successes can be directly attributed to the direction of General George Washington and the actions of his operatives.
|
13 |
...among other things...Tisdale, Michael 01 May 2017 (has links)
Essay about the play by the author
Production Notes
Acknowledgements
Full Text of "...among other things..." by Michael Tisdale
|
14 |
George Washington, America's first director of military intelligencePrather, Michael S. January 2002 (has links) (PDF)
Thesis (master's)--United States Marine Corps Command and Staff College, 2002. Thesis--George Washington, as Commander-in-Chief of the Continental Army led this nation to victory and independence in the American War for Independence. Victory was facilitated by his direct and effective use of intelligence sources and methods. Discussion: During the American War for Independence, intelligence information regarding location, movement, and disposition of British forces allowed the Continental Army to fight on its own terms and stymie British efforts to quell the revolution. General George Washington, as Commanding General of the Continental Army, was aware of the value of intelligence in the proper conduct of military operations. Washington literally became America's first director of military intelligence. He directed the intelligence operations that were conducted, and performed his own analysis. The Continental Army's effectiveness in intelligence includes examples of the proper use of espionage, counterintelligence, communications security, codebreaking, deception, operational security, surveillance, reconnaissance, reporting and analysis. Time after time, the Americans were properly prepared with good intelligence ultimately resulting in independence from the British. These intelligence successes can be directly attributed to the direction of General George Washington and the actions of his operatives. / Mentor(s): John B. Matthews, David A. Kelley. Includes bibliographical references (p. 52-54). Also available online.
|
15 |
Cyberespionage 2010 : is the current status of espionage under international law applicable in cyberspace? /Romero, Jorge H. January 2001 (has links) (PDF)
Thesis (L.L.M.)--Georgetown University, Law Center, 2001. / "30 April 2001." Includes bibliographical references. Also available via the Internet.
|
16 |
The ethical resister's last resort news coverage over the allegations of a national security whistleblower /Amundson, Ryan. Lo, Clarence Y. H. January 2009 (has links)
The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Title from PDF of title page (University of Missouri--Columbia, viewed on October 14, 2009). Thesis advisor: Dr. Clarence Lo. Includes bibliographical references.
|
17 |
To Catch a Thief: Protecting Proprietary Information Including Trade Secrets From Corporate EspionageKoen, Clifford M., London, Wm Brian 01 October 2019 (has links)
Corporate espionage is a multifaceted problem causing hundreds of billions of dollars in losses to businesses each year. Health care managers have a wide variety of options available to prevent theft of their organizations' trade secrets and other proprietary information. Organizations should protect their confidential and trade secret information by taking various security measures to limit access to protected material and by using appropriate types of restrictive covenants such as nondisclosure, noncompetition, and nonsolicitation agreements. This article provides helpful guidance for managers to maximize protection against theft of proprietary information.
|
18 |
Waging Warfare Against States: The Deployment of Artificial Intelligence in Cyber EspionageWan Rosli, Wan R. January 2026 (has links)
Yes / Cyber espionage has significantly been viewed as a risk towards nation-states, especially in the area of security and protection of Critical National Infrastructures. The race against digitisation has also raised concerns about how emerging technologies are defining how cyber activities are linked to waging warfare between States. Real-world crimes have since found a place in cyberspace, and with high connectivity, has exposed various actors to various risks and vulnerabilities, including cyber espionage. Cyber espionage has always been a national security issue as it does not only target States but also affects public-private networks, corporations and individuals. The challenge of crimes committed within the cyber realm is how the nature of cybercrimes distorts the dichotomy of state responsibility in responding to cyber threats and vulnerabilities. Furthermore, the veil of anonymity and emerging technologies such as artificial intelligence have further provided opportunities for a larger scale impact on the state for such crime. The imminent threat of cyber espionage is impacting the economic and political interactions between nation-states and changing the nature of modern conflict. Due to these implications, this paper will discuss the current legal landscape governing cyber espionage and the impact of the use of artificial intelligence in the commission of such crimes. / The full-text of this article will be released for public view at the end of the publisher embargo, 12 months after first publication.
|
19 |
Three essays on international cyber threats: Target nation characteristics, international rivalry, and asymmetric information exchangeMauslein, Jacob A. January 1900 (has links)
Doctor of Philosophy / Security Studies / Jeffrey J. Pickering / As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasingly important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, the findings are not generalizable and fail to address the global aspects of network vulnerabilities. As a result, this dissertation employs a unique dataset of cyber threats from around the world, spanning from 1990 to 2011. This dataset allows for three diverse empirical studies to be conducted. The first study investigates the political, social, and economic characteristics that increase the likelihood of a state being targeted for cyber threats. The results show that different state characteristics are likely to influence the forms of digital attack targeting. For example, states that experience increases in GDP per capita and military size are more likely to be targeted for cyber attacks. Inversely, states that experience increases in GDP per capita and those that are more democratic are less likely to be targeted for cyber terrorism. The second study investigates the role that international rivalries play in cyber threat targeting. The results suggest that states in rivalries may have more reason to strengthen their digital security, and rival actors may be cautious about employing serious, threatening forms of cyber activity against foes because of concerns about escalation. The final study, based upon the crisis bargaining theory, seeks to determine if cyber threat targeting decreases private information asymmetry and therefore decreases conflict participation. Empirical results show that the loss of digital information via cyber means may thus illicit a low intensity threat or militarized action by a target state, but it also simultaneously increases the likelihood that a bargain may be researched, preventing full scale war by reducing the amount of private information held between parties.
|
20 |
Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case StudyBeyer, Dawn Marie 01 January 2014 (has links)
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) establish priorities for CS investment planning and management decisions. The cyber preparedness framework (CPF) underlies the CPM. A corporation's leadership articulates its fundamental approach to risk management (RM) and mission assurance, and determines its target level of preparedness. Typically, corporations utilize the CPF to (a) characterize the caliber of the threat; (b) assess the technical and operational capabilities to counter the threat; and (c) develop the governance and processes necessary to achieve its cyber preparedness level.
The problem that was investigated in this case study was how to construct a CPF for Lockheed Martin (LM) that works in conjunction with a risk management process (RMP). The goal was to extend the CPF into an RMP to construct a risk management framework (RMF) paradigm that can aid similarly large-sized private sector U.S. Government (USG) contractors in implementing the CPM. In this investigation, the author identified the corporate (a) security categorization, (b) cyber threats, (c) cyber threat level, (d) cyber preparedness level, (e) capabilities the corporation should utilize to counter cyber threats, and (f) governance and processes necessary to achieve the cyber preparedness level for a large-sized private sector USG contractor. The results of this investigation were organized in terms of RMP phases. Based on the results, the author constructed an RMF paradigm that can aid similarly large-sized USG contractors in implementing a CPM.
|
Page generated in 0.0602 seconds